CVE-2025-66335
Description
Apache Doris MCP Server versions earlier than 0.6.1 are affected by an improper neutralization flaw in query context handling that may allow execution of unintended SQL statements and bypass of intended query validation and access restrictions through the MCP query execution interface. Version 0.6.1 and later are not affected.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Doris MCP Server before 0.6.1 fails to neutralize query context, allowing SQL injection and bypass of validation via the MCP query execution interface.
Vulnerability
Overview
CVE-2025-66335 describes an improper neutralization flaw in Apache Doris MCP Server versions prior to 0.6.1. The vulnerability resides in the query context handling within the MCP (Model Context Protocol) query execution interface. Due to insufficient input sanitization, an attacker can inject unintended SQL statements that bypass the server's intended query validation and access restrictions [1][2][3].
Exploitation and
Attack Surface
The attack vector targets the MCP server's tool-based interaction model, which is designed to execute database queries—including those generated from natural language via LLMs. The attacker does not require authentication beyond what is provided by the MCP client interface; the flaw allows the injection of malicious SQL through crafted queries that are not properly neutralized before execution. This can be done remotely over the network without any special privileges beyond access to the MCP endpoint [1][3].
Impact
Successful exploitation could allow an attacker to execute arbitrary SQL commands on the backend database, potentially reading, modifying, or deleting sensitive data. The vulnerability also enables bypassing the server's security controls, such as token-based authentication and role-based permissions, as the injected SQL is executed within the context of the MCP server's database connection [1][4].
Mitigation
The issue is fixed in Apache Doris MCP Server version 0.6.1, released on 2026-03-13 [4]. Users should upgrade immediately. Version 0.6.1 includes a centralized sql_security_utils module with comprehensive SQL injection prevention and over 2,500 lines of security test coverage [4]. No workaround is documented, and the vendor considers the previous versions affected from 0.1.0 up to (but not including) 0.6.1 [3].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
doris-mcp-serverPyPI | >= 0.1.0, < 0.6.1 | 0.6.1 |
Affected products
2cpe:2.3:a:apache:doris_mcp_server:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:apache:doris_mcp_server:*:*:*:*:*:*:*:*range: >=0.1.0,<0.6.1
- (no CPE)range: <0.6.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-qhfq-gvvc-5q6qghsaADVISORY
- lists.apache.org/thread/odp0fyyst8kxm7hhm9z4d1snh1y4hjpynvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2025-66335ghsaADVISORY
- www.openwall.com/lists/oss-security/2026/04/17/4nvdMailing ListWEB
- github.com/apache/doris-mcp-server/releases/tag/0.6.1ghsaWEB
News mentions
2- ⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and MoreThe Hacker News · May 18, 2026
- Bug hunter tracks down three massive MCP flaws and one vendor won't fix theirsThe Register Security · May 13, 2026